CYBR C260: Intermediate Incident Response
Item | Value |
---|---|
Curriculum Committee Approval Date | 10/27/2023 |
Top Code | 070800 - Computer Infrastructure and Support |
Units | 3 Total Units |
Hours | 72 Total Hours (Lecture Hours 54; Lab Hours 18) |
Total Outside of Class Hours | 0 |
Course Credit Status | Credit: Degree Applicable (D) |
Material Fee | No |
Basic Skills | Not Basic Skills (N) |
Repeatable | No |
Grading Policy | Standard Letter (S),
|
Course Description
Students will explore incident response techniques using industry-recognized tools. Topics covered include planning and scoping a cyber incident, information gathering for vulnerability assessment, vulnerability scanning and summarization reporting, report writing and best practices, obfuscation techniques, forensic artifacts, social media forensics, memory forensics, ethics, and compliance issues. Hands-on assignments will be used to develop technical skills relevant to entry-level cybersecurity professionals. This course is intended for students with computer experience and an interest in cyber defense for private organizations or government law enforcement. Careers and emerging trends in the field of cybersecurity will be evaluated. ADVISORY: IT C128 and CYBR C230.Transfer Credit: CSU.
Course Level Student Learning Outcome(s)
- Outline an incident plan and scope for an assessment.
- Demonstrate the use of appropriate tools and techniques to perform vulnerability scanning and locate indicators of compromise.
- Analyze results of vulnerability scan to provide practical recommendations for management.
Course Objectives
- 1. Demonstrate an understanding of the Incident Response process, including scoping, planning, and reporting.
- 2. Describe the need for vulnerability scanning and use of indicators of compromise as applied to cyber incident handling.
- 3. Demonstrate an understanding of forensic artifacts, including social media, computer memory.
- 4. Demonstrate an understanding of law enforcement careers and emerging trends in the field of incident response.
Lecture Content
Planning Gather information on systems to be evaluated Indicators of compromise Purpose of review 1. Civil case 2. Divorce 3. Family law Role of ethics and compliance Establishing scope of the project Identify tools needed for information gathering Penetration Testing Perform vulnerability scan Commonly used tools1. Cobalt Strike2. Metasploit3. SIFT workstation4. SIEM workstation Understanding Code Obfuscation Techniques Exploit network Analyze results Collect forensic artifacts from red team activity Incident Response Topics Social media forensics Memory forensics Point of Sale (POS) Payment Systems Linux Forensics Reporting Techniques Draft management report Summarize results Provide recommendations Update risk assessment based on findings
Lab Content
Students will work with remote lab environments to complete hands-on activities. Scan network for vulnerabilities and summarize results Conduct information gathering exercises using various tools (eg. Cobalt Strike, Metasploit, SIFT workstation, SIEM) Detect obfuscation techniques Locate indicators of compromise Create a comprehensive report of evidence collected Locate forensic artifacts from red team activity Find the pivot point of an investigation Find the time anchor for an incident Social media forensics Memory forensics Linux forensics Create a comprehensive report of evidence collected throughout the process
Method(s) of Instruction
- Lecture (02)
- DE Live Online Lecture (02S)
- DE Online Lecture (02X)
- Lab (04)
- DE Live Online Lab (04S)
- DE Online Lab (04X)
Instructional Techniques
This course will utilize a combination of lecture, hands-on guided laboratory assignments, classroom/discussion student interactions, problem solving, quizzes, tests, and troubleshooting assignments to achieve the goals and objectives of this course. All instructional methods are consistent across all modalities.
Reading Assignments
Read about incident response techniques and planning. Read about commonly used tools used in incident response. Read about code obfuscation techniques.
Writing Assignments
Draft a report for management detailing results of vulnerability scan. Perform an update to risk assessment rating based on the work performed.
Out-of-class Assignments
Complete hands-on lab using commonly used tools to perform a vulnerability scan. Complete hands-on lab to collect forensic artifacts from red team activities.
Demonstration of Critical Thinking
Students will conduct vulnerability scan using best practices processes and procedures.
Required Writing, Problem Solving, Skills Demonstration
Skills will be demonstrated through completion of hands-on lab exercises using commonly used vulnerability assessment tools and document analysis performed to provide management recommendations.
Eligible Disciplines
Computer information systems (computer network installation, microcomputer ...: Any bachelors degree and two years of professional experience, or any associate degree and six years of professional experience. Computer service technology: Any bachelors degree and two years of professional experience, or any associate degree and six years of professional experience.
Textbooks Resources
1. Required Anson, S. Applied Incident Response, 1st ed. John Wiley Sons, 2020
Other Resources
1. Coastline Library 2. OER - Open Educational Resources